• Blog
How to Make Adversaries Cry: Part 1
Posted by: Joaquim Nogueira
Read More 9 min read
  • Blog
Securing Hugging Face Workloads on Kubernetes
Posted by: Keegan Justis
Read More 5 min read
  • GRIT Blog
Fraudster’s Fumble: From Phish to Failure
Posted by: Gabe Renfro
Published 07/18/24, 09:00am
Read More 10 min read
  • Cybersecurity
CMMC On Fast Track to Becoming Law
Posted by: Jason Spencer
Read More 2 min read
  • Blog
WWDMD – What Would Dade Murphy Do? – Reconnaissance & Intelligence Collection for External Penetration Tests
Posted by: GuidePoint Security
Read More 16 min read
  • Blog
SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment
Posted by: Marshall Price
Read More 16 min read
  • GRIT Blog
GRIT Ransomware Report: May 2024
Posted by: Justin Timothy
Published 06/13/24, 08:45am
Read More 18 min read
  • GRIT Blog
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider
Posted by: Jason Baker
Published 06/12/24, 05:45am
Read More 11 min read
  • Blog
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
Posted by: GuidePoint Security
Read More 10 min read
  • Blog
Leveraging Escalation Attacks in Penetration Testing Environments – Part 2
Posted by: GuidePoint Security
Read More 11 min read
  • Blog
The Art of Self-Defense: Security Validation Through Attack Simulation
Posted by: Conor Murphy
Read More 5 min read
  • Blog
Beyond the Basics: Exploring Uncommon NTLM Relay Attack Techniques
Posted by: Kevin Murphy
Read More 17 min read